Text4Shell vulnerability CVE-2022-42889
Enovation Group and its subsidiaries; Enovation B.V., E.Novation, Enovation Belgium B.V., Verklizan SARL (Enovation France), Verklizan GmbH (Enovation Germany), Verklizan S.L. (Enovation Spain), E.Novation UK Ltd., Multisignaal B.V., CPI B.V. and Funatic B.V. are aware of the Text4Shell vulnerability, first reported on Thursday, 13 October 2022 and escalated on Tuesday, 18 October 2022 by the Dutch National Cyber Security Center (NCSC).
The Enovation Security Office is actively monitoring the status of the vulnerability across all our products and services.
After intensive review and testing we have determined that the vulnerability for Text4Shell (CVE-2022-42889) does not affect our services.
We are monitoring the situation closely and should we find any anomaly we will immediately take the appropriate actions and update this post.
If you have any questions or concerns about this matter, please contact:
- Germany: firstname.lastname@example.org
- UK: email@example.com
- Netherlands/Other: firstname.lastname@example.org
More information about the vulnerability is available at www.cve.org